0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Your Complete Guide to Wireshark
By: Olivia
June 21, 2017

You may know Wireshark as the ‘best network protocol analyzer in the world,’ but do you know how to use it? Being familiar with this popular tool can help you stand out on your resume, or can help you go further in your current IT role as it has plenty of benefits for users.“With more than 500,000 downloads a ...

My Top Tips For Preparing and Passing The CISSP Exam
By: Responsible Cyber
June 20, 2017

I would like to share 3 TIPS to be prepared for the CISSP exam , and opportunities for #women to start a #career in #cybersecurity .The (ISC)² Women’s InformationSecurity Scholarship program is directed by the Center for Cyber Safety and Education. Women who are passionate about Cyber Security should apply to ...

Conducting an Internal Phishing Campaign
By: ram
June 20, 2017

How to Conduct an Internal Phishing CampaignI’m going to go through the process, as fully as I can, of how I phished our organization, with the hopes of helping you plan your phishing campaigns for your org.  VITAL: You MUST have your company’s approval to do this, and ONLY do it for your company after approval. Doing this ...

How to Pass: CEH Practice Exam
By: Olivia
June 19, 2017

The CEH exam carries a lot of hype, as people are determined to become ethical hackers and want a signifier of their skills. While the CEH is ideal for that, you will want to have prior security knowledge before jumping right into the exam. If you have some security knowledge already and need a way to gauge ...

How to Jailbreak iOS 10-10.2 with Yalu
By: 0xff7
June 18, 2017

This tutorial is going to show you how to jailbreak all 64bit iPhone/iPad/iPod on iOS 10-10.2 Download Cydia Impactor from https://www.cydiaimpactor.com/ Download Yalu102 from https://yalu.qwertyoruiop.com/ Connect your device to computer and run Cydia Impactor, If it looks ...

How to Pass: CCNA Practice Test
By: Olivia
June 17, 2017

There’s been a lot of chatter surrounding the CCNA exam. More specifically, which test format is best to guarantee you’ll pass. While that answer is entirely dependent on the individual, the CCNA Practice Test can be a valuable resource in helping you to evaluate where your knowledge lies and choosing the format that coincides best. Confidence is Key ...

Android for Business Made Clear
By: Christopher Bainbridge
June 17, 2017

With the decline of Blackberry and the increasing number of users wanting to use iOS or Android for work, this gives companies a bit of a headache due to these platforms having more complex problems than the simple deployment and management of Blackberry’s for business. For a while, iOS has been a lot more popular ...

Convert NSF to PST by Easily Exporting Files from Lotus Notes
By: kumarsandeep43
June 16, 2017

Lotus Notes is an email communication used by IBM, while Outlook is from Microsoft. Both email Clients save data in NSF and PST format respectively. To convert NSF to PST follow the below steps: Export NSF database First, launch IBM Lotus Notes and Open NSF Database to export data ...

Security Issues with SaaS and the Cloud
By: Sasha Radenovic
June 16, 2017

Data Security: Data breaches happen all the time. News reports of hacking and industrial espionage hit the headlines daily and present a serious threat to small and medium sized businesses. On-premise software still presents its own set of security concerns, but be wary of new technologies and vendors who do not have a robust security system in ...

UNM4SK3D: NSA, Hidden Cobra, and Power Grids
By: Olivia
June 16, 2017

#wikileaks (drip, drip, drip) The Cherry Blossoms that bloom around Washington D.C. have since died, but the 'Cherry Blossom' Wireless Router Hacking System is alive and well. This is the latest of the Vault 7 leaks, released June 15th.  Someone with a green thumb must have named 'Cherry Blossom,'  a framework being used by ...